Academic literature on the topic 'Information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security"

1

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (August 30, 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (October 11, 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Full text
Abstract:
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
APA, Harvard, Vancouver, ISO, and other styles
8

Erceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (June 17, 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Full text
Abstract:
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information security"

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO, and other styles
2

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management. The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations. The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.
APA, Harvard, Vancouver, ISO, and other styles
3

Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Full text
Abstract:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the generated results were evaluated.
APA, Harvard, Vancouver, ISO, and other styles
4

Saltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Full text
Abstract:
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
APA, Harvard, Vancouver, ISO, and other styles
5

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:

The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researcher to offer several conclusions related to the importance of planning, communication, offensive capabilities, and integration with third-party organizations. Information security incident management is accomplished as an escalation process with multiple decision points leading to a restoration of services or security. The source of the incident is not often sought beyond the first external IP address but their purpose and intent are essential to information security incident management. The key lessons learned from professionals include the importance of having a plan, training the plan, and incorporating the human elements of security into information security incident response. Penetration testing as well a knowledge about threat and attack patterns are important to information security incident management for detection, containment, and remediation. External organizations play a major role in the management of information security incidents as fear, incompetence, and jurisdictional issues keep the private sector from working with government, military, and law enforcement organizations. These themes have wide reaching implications for practical application and future research projects.

APA, Harvard, Vancouver, ISO, and other styles
6

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Full text
Abstract:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
APA, Harvard, Vancouver, ISO, and other styles
7

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Full text
Abstract:
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.   In order to explore this phenomenon further, an exploratory study have been carried out to find more information on the subject. This has been done in several ways in order to grasp as much information as possible. Firstly, by doing a literary study to find out what is already known within the field of information security in regard to students. Secondly, by doing a quantitative study that evaluates the student’s information security awareness. And lastly, by conducting an interview with a member of staff at a university to find out their attitude towards the phenomenon.    The thesis concludes by suggesting how universities might want to handle information security in relationship to students.
APA, Harvard, Vancouver, ISO, and other styles
8

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
APA, Harvard, Vancouver, ISO, and other styles
9

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Talib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Full text
Abstract:
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and personalised approach to educating users, opting for a blanket, one-size-fits-all solution. This research focuses upon achieving a better understanding of the information security awareness domain; appreciating the requirements such a system would need; and importantly, drawing upon established learning paradigms in seeking to design an effective personalised information security education. A survey was undertaken to better understand how people currently learn about information security. It focussed primarily upon employees of organisations, but also examined the relationship between work and home environments and security practice. The survey also focussed upon understanding how people learn and their preferences for styles of learning. The results established that some good work was being undertaken by organisations in terms of security awareness, and that respondents benefited from such training – both in their workplace and also at home – with a positive relationship between learning at the workplace and practise at home. The survey highlighted one key aspect for both the training provided and the respondents’ preference for learning styles. It varies. It is also clear, that it was difficult to establish the effectiveness of such training and the impact upon practice. The research, after establishing experimentally that personalised learning was a viable approach, proceeded to develop a model for information security awareness that utilised the already successful field of pedagogy and individualised learning. The resulting novel framework “Personalising Information Security Education (PISE)” is proposed. The framework is a holistic approach to solving the problem of information security awareness that can be applied both in the workplace environment and as a tool for the general public. It does not focus upon what is taught, but rather, puts into place the processes to enable an individual to develop their own information security personalised learning plan and to measure their progress through the learning experience.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information security"

1

Drevin, Lynette, Suné Von Solms, and Marianthi Theocharidou, eds. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Longley, Dennis, Michael Shain, and William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mambo, Masahiro, and Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui, and Siu Ming Yiu, eds. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chan, Agnes Hui, and Virgil Gligor, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gollmann, Dieter, and Felix C. Freiling, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Susilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Liqun, Mark Manulis, and Steve Schneider, eds. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information security"

1

von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance, 1–11. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernando, Anjana, and Lakmal Warusawithana. "Information Security." In Beginning Ballerina Programming, 227–68. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "information security." In Computer Science and Communications Dictionary, 778. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Richard. "Information Security." In Information Technology, 329–66. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Edward, Y. Uechi. "Information Security." In Public Service Information Technology, 155–82. Boca Raton : Taylor & Francis, 2020.: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reveron, Derek S., and Kathleen A. Mahoney-Norris. "Information Security." In Human and National Security, 181–201. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "security information." In Computer Science and Communications Dictionary, 1535. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sheppey, Terence, and Ross McGill. "Information Security." In Sarbanes-Oxley, 277–96. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Neel, Andrew J. "Information Security." In Encyclopedia of Sciences and Religions, 1055–58. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_1220.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security"

1

Neogy, Sarmistha. "Information security." In IML 2017: International Conference on Internet of Things and Machine Learning. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Information Security." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Information security." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carroll, Michael D. "Information security." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Селейдарян, Элина Михайловна, and Матвей Артёмович Лысенко. "INFORMATION SECURITY." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.

Full text
Abstract:
В работе рассмотрены главные компоненты информации, ее влияние и значимость в современном мире. Автором анализируются предпринимаемые меры руководства страны по предотвращению войны в информационном пространстве. The paper considers the main components of information, its influence and significance in the modern world. The author analyses the measures taken by the country's leadership to prevent war in the information space.
APA, Harvard, Vancouver, ISO, and other styles
6

Alkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli, and Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Yue, and Katalin Takacs-Gyorgy. "Information security of food security." In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions." In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Colbaugh, Richard, Kristin Glass, and Travis Bauer. "Dynamic information-theoretic measures for security informatics." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cooper, Michael H. "Information security training." In the ACM SIGUCCS fall conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1629501.1629541.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security"

1

Bowen, P., J. Hash, and M. Wilson. Information security handbook :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tsang, Wai, Karen Burkardsmaier, and Ed Scheidt. Information-Centric Security. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada421985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

LOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada386363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kissel, Richard. Small business information security :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lane, Brendan F., and Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada418505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), April 1993. http://dx.doi.org/10.2172/6934153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moser, William S. The Economics of Information Security. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Fort Belvoir, VA: Defense Technical Information Center, August 2001. http://dx.doi.org/10.21236/ada405011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography